TRENDS is authorized to promote and deliver F5 courses in partnership with Red Education. F5 logo is a registered trademark of F5 Networks, Inc. in the US and in certain other countries. All rights reserved.
Configuring BIG-IP Access Policy Manager (APM) v14.1
Schedule
Start | End | Duration | Location | Details |
---|
Course Details
F5 CONFIGURING BIG-IP ACCESS POLICY MANAGER (APM) V14.1
Course Code: F5-BIG-IP-APM
Duration: 3 Days
Prerequisite:
Students should understand: Basic HTTP and HTML concepts Basic security concepts Common network terminology Web application terminology In addition, students should be proficient in: Basic PC operation and application skills, including operating a keyboard, mouse, Linux and Windows OS Basic Web browser operation (Internet Explorer and Mozilla Firefox are used in class)
Course Description:
This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.
Intended Audience:
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP APM System.
Course Outline:
Module 1: APM Traffic Processing and APM Configuration Wizards
Module 2: APM Access Policies, Access Profiles
Module 3: Visual Policy Editor, Branches and Endings
Module 4: APM Portal Access and Rewrite Profiles
Module 5: Single Sign-On and Credential Caching
Module 6: APM Network Access and BIG-IP Edge Client
Module 7: Layer 4 and Layer 7 Access Control Lists
Module 8: APM Application Access and Webtop Types
Module 9: Remote Desktop, Optimized Tunnels and Webtop Links
Module 10: LTM Concepts including Virtual Servers, Pools, Monitors and SNAT’ing
Module 11: APM + LTM Use Case for Web Applications
Module 12: Visual Policy Editor Macros
Module 13: AAA Servers and Authentication and Authorization with Active Directory and RADIUS
Module 14: Endpoint Security with Windows Process Checking, Protected Workspace and Firewalls
Module 15: iRules, Customization and SAML